Cyber Security

Cyber Security: Awareness Programmes: Are They Really Working? And What to Do About it? By JC Gaillard

When some people say they don’t know what to do around cyber, you may want to ask them where they have been for the last 10 years…

For a number of years, I have been puzzled by the high idea some cyber security professionals seem to have that their job is about convincing other people: Convincing users that they need to do certain things to protect themselves and their data; Convincing the Board that they need to invest more to protect the business, etc…

Indicators of Attack – A Proactive Approach to Cyber Defence

In an era where attacks are increasingly more sophisticated, it is critical that the defensive capabilities you employ can collect, assemble, and interpret the data flowing through your network.

These data fragments are the building blocks of intelligence that form early warning signs that your network may be under attack and being able to identify these vital warning signs can dramatically decrease the Mean-Time-To-Mitigation (MTTM).

4 Reasons to Invest in an Outsourced SOC

Cyber security is an ever evolving and expanding challenge and a lot of businesses struggle to keep up with the changing threat landscape.

The costs of implementing the necessary technologies and personnel to proactively monitor and investigate threats in-house could very quickly become very expensive – not to mention ensuring regulatory compliance and minimising alert fatigue among the team.

The Business Case for Situational Awareness in Your Supply Chain

The BTN was recently delighted to partner again with RiskRecon, a Mastercard Company, for an exclusive roundtable, specialising in risk assessment automation and cyber risk management, to discuss ‘The Business Case for Situational Awareness in Your Supply Chain'.

The session looked at what can we be doing to increase the visibility of supply chain threats? How do we determine and identify risky vendors in our ecosystem? And where do we start when building an action-oriented 3rd party risk program?

Forrester Consulting Study: Trusting Zero Trust

The new normal consists of cloud and device insecurity. Did you know that nearly 70% of respondents said their firm has struggled to maximize the productivity of remote workers without exposing them or their devices to new risk. 75% said they agree that to be better prepared, their firms must update their technical reference architectures for cloud security and ensure that ZT design principles are baked into cloud adoption and migration.

The Problem with Cyber Security ROI

CISOs being asked those questions should look beyond the topic itself and face the underlying issues it might be hiding.

If the reporting line of the CISO is the oldest ongoing topic of discussion amongst cyber security communities, security ROI is probably the second oldest…

In reality, it hides several endemic problems which have been plaguing the security industry for the last two decades.